The modules are rogue DLL (dynamic link library) files and were installed by a malware program the Trustwave researchers dubbed ISN that infects both 32-bit and 64-bit versions of IIS6 and IIS7+.

ISN detects the IIS version and installs the corresponding DLL module, which then monitors POST requests -- data submissions -- to specific URLs and saves the information to a log file.

This method allows the data to be collected even if the connection between the user and the server is protected by SSL (Secure Sockets Layer). The captured data can be, for example, personal and payment details entered on an e-commerce site running on a compromised IIS server. The rogue DLLs also enables attackers to send certain commands through URL parameters in order to download the stored information.

In a new blog post Friday, the researchers revealed that ISN is being installed on the compromised IIS servers by exploiting a remote authentication bypass vulnerability in Adobe ColdFusion, a Web application platform.

Adobe released a patch for the vulnerability, identified as CVE-2013-0629, back in January, a few weeks after warning customers that the vulnerability was being actively exploited in attacks.

In this case, the attackers are exploiting CVE-2013-0629 to install a backdoor application called a Web shell that allows them to execute shell commands on the underlying operating system.

The Trustwave researchers traced such a ColdFusion compromise that led to the installation of ISN back to the end of February, over a month after Adobe issued its patch. "In this particular incident, the victim organization was aware of the vulnerability report by Adobe, however they were on a quarterly patching process and had not yet installed the patch," the Trustwave researchers said.

The incident outlines a problem many organizations have when it comes adjusting their patching schedules to keep up with today's attackers who are targeting newly disclosed vulnerabilities much faster than in previous years.

It also shows that ColdFusion represents an interesting target for attackers. Adobe warned customers two times this year about ColdFusion vulnerabilities that had no patches and were already being actively exploited by attackers. In April hackers broke into the management servers and customer database of Linode, a virtual private server hosting firm, by exploiting a previously unknown ColdFusion vulnerability.

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. Copyright 2013 IDG Communications.
ABN 14 001 592 650. All rights reserved.

Contact Us

With over 25 years of brand awareness and credibility, Good Gear Guide (formerly PC World Australia), consistently delivers editorial excellence through award-winning content and trusted product reviews.